First published: Wed May 06 2020(Updated: )
Multiple vulnerabilities in the web-based GUI of Cisco AsyncOS Software for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerabilities are due to improper input validation of the parameters of an HTTP request. An attacker could exploit these vulnerabilities by intercepting an HTTP request and modifying it to redirect a user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page or to obtain sensitive browser-based information. This type of attack is commonly referred to as an open redirect attack and is used in phishing attacks to get users to unknowingly visit malicious sites. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-opn-rdrct-yPPMdsMQ
Credit: These vulnerabilities were found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sma-opn-rdrct-yPPMdsMQ is classified as high due to the potential for remote exploitation.
To fix cisco-sa-sma-opn-rdrct-yPPMdsMQ, ensure to apply the latest updates and patches provided by Cisco for the AsyncOS Software.
Organizations using Cisco AsyncOS Software for Cisco Content Security Management Appliance are affected by cisco-sa-sma-opn-rdrct-yPPMdsMQ.
The risks associated with cisco-sa-sma-opn-rdrct-yPPMdsMQ include unauthorized redirection to malicious websites by attackers.
Yes, cisco-sa-sma-opn-rdrct-yPPMdsMQ can be exploited remotely by an unauthenticated attacker.